![]() |
|
Message-ID: <CAHXwHVwBUCqgagS=RfdnNEoBkfmSTNJff28U=Syff0Chm0X4bQ@mail.gmail.com> Date: Tue, 17 Jun 2025 09:21:21 -0400 From: Craig Ingram <cjingram@...gle.com> To: oss-security@...ts.openwall.com Subject: [kubernetes] Race Condition in Go allows Volume Deletion in older Kubernetes versions Hello Kubernetes Community, The Go team has released a fix in Go versions 1.21.11 and 1.22.4 addressing a symlink race condition when using os.RemoveAll. The Kubernetes Security Response Committee received a report that this issue could be abused in Kubernetes to delete arbitrary directories on a Node with root permissions by a local non-root user with the same UID as the user in a Pod. The Go team has not issued a CVE for this, as it is considered a hardening issue, and the SRC is following that decision as well. Am I affected? Kubernetes built with Go versions prior to 1.21.11 or 1.22.4 are affected. Affected Versions - <1.30.2 - <1.29.6 - <1.28.11 - <1.27.15 How do I mitigate this issue? Upgrade to a fixed (or newer) version of Kubernetes. Fixed Versions - 1.30.2+ - 1.29.6+ - 1.28.11+ - 1.27.15+ To upgrade, refer to the documentation: https://kubernetes.io/docs/tasks/administer-cluster/cluster-upgrade/ Detection This issue could be detected by looking for unexpected file deletions on a Node. If you find evidence that this vulnerability has been exploited, please contact security@...ernetes.io Additional Details See the GitHub issue for more details: https://github.com/kubernetes/kubernetes/issues/132267 Acknowledgements This issue was reported by Addison Crump Thank You, Craig Ingram on behalf of the Kubernetes Security Response Committee
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.